Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1757414423-d2608fd/classes/rubriek.inc on line 88 Computer en informatica - Managementboek.nl
Op werkdagen voor 23:00 besteld, morgen in huisGratis verzending vanaf €20
Our homes anticipate when we want to wake up. Our computers predict what music we want to buy. Our cars adapt to the way we drive. In today’s world, even washing machines, rice cookers and toys have the capability of autonomous decision-making. Meer
Preface Mathematica introduced two important innovations to computer graphics. The first was the close integration of high-quality graphics in a computational system. Meer
There are several theories of programming. The first usable theory, often called "Hoare's Logic", is still probably the most widely known. In it, a specification is a pair of predicates: a precondition and postcondition (these and all technical terms will be defined in due course). Meer
MacMath is a scientific toolkit for the Macintosh computer consisting of twelve graphics programs. It supports mathematical computation and experimentation in dynamical systems, both for differential equations and for iteration. Meer
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. Meer
State of the Art in Computer Graphics Aspects of Visualization This is the fourth volume derived from a State of . . . the Art in Computer Graphics Summer Institute. Meer
How to Use This Handbook The MATLAB Handbook is a complete reference tool for the MATLAB computation language, and is written for all MATLAB users, regardless of their discipline or field(s) of interest. Meer
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Meer
55,81
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. Meer
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. Meer
Practical Time Series Analysis for Data Science is an accessible guide that doesn’t require a background in calculus to be engaging but does not shy away from deeper explanations of the techniques discussed. Meer
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner. Meer
Provides complete update and organization of the previous books, with some material moving online; Includes new problems, projects, and exercises; Includes interactive coding resources to accompany the book, including examples in the text, exercises, projects, and refection questions. Meer
Featuring an international team of authors, Neural Network Perspectives on Cognition and Adaptive Robotics presents several approaches to the modeling of human cognition and language using neural computing techniques. Meer
The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Meer
Multi-robot systems are a major research topic in robotics. Designing, testing, and deploying aerial robots in the real world is a possibility due to recent technological advances. Meer
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. Meer
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. Meer
This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books